Accepted Papers

The proceedings are available here.

  1. Impossibilities in Succinct Arguments: Black-box Extraction and More
    Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh and Janno Siim.
    .
  2. Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps
    Ginevra Giordani, Lorenzo Grassi, Silvia Onofri and Marco Pedicini.
    .
  3. Universal hashing based on field multiplication and (near-)MDS matrices.
    Koustabh Ghosh, Joan Daemen, Parisa Eliasi and Jonathan Fuchs.
    .
  4. Efficient computation of (3n,3n)-isogenies
    Thomas Decru and Sabrina Kunzweiler.
    .
  5. MinRank in the Head: Short Signatures from Zero-Knowledge Proofs
    Gora Adj, Luis Rivera-Zamarripa and Javier Verbel.
    .
  6. Quantum Search-to-Decision Reduction for the LWE Problem
    Kyohei Sudo, Masayuki Tezuka, Keisuke Hara and Yusuke Yoshida.
    .
  7. The curious case of the half-half Bitcoin ECDSA nonces
    Dylan Rowe, Joachim Breitner and Nadia Heninger.
    .
  8. Concrete Security from Worst-Case to Average-Case Lattice Reductions
    Joel Gärtner.
    .
  9. Take your MEDS: Digital Signatures from Matrix Code Equivalence
    Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska and Monika Trimoska.
    .
  10. Poseidon2: A Faster Version of the Poseidon Hash Function
    Lorenzo Grassi, Dmitry Khovratovich and Markus Schofnegger.
    .
  11. Finding and Evaluating Parameters for BGV
    Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu and Najwa Aaraj.
    .
  12. Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
    James Howe and Bas Westerbaan.
    .
  13. A Side-Channel Attack against Classic McEliece implementation
    Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso and Brice Colombier.
    .
  14. The special case of cyclotomic fields in quantum algorithms for unit groups
    Razvan Barbulescu and Adrien Poulalion.
    .
  15. On the Post-Quantum Security of Classical Authenticated Encryption Schemes
    Nathalie Lang and Stefan Lucks.
    .
  16. Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions
    Duc Tri Nguyen and Kris Gaj.
    .
  17. From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
    Jikang Lin, Jiahui He, Yanhong Fan and Meiqin Wang.
    .
  18. Applications of Timed-release Encryption with Implicit Authentication
    Angelique Faye Loe, Liam Medley, Christian O’Connell and Elizabeth Quaglia.
    .
  19. Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant
    Abderrahmane Nitaj and Maher Boudabra.
    .
  20. ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain
    Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey and Martin Zuber.
    .
  21. Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality
    Mario Larangeira and Maxim Jourenko.